The future is stranger than you might think

Stranger Labs is a “hack tank” formed by experts from industry and academia to research, develop, and promote the use of advanced technologies that enhance security, privacy, and resilience.

Learn how

We apply diverse expertise in software development, distributed systems, and applied cryptography to help you solve hard technical problems, build capability, and innovate with emerging technologies.

Technology Practice Areas

Verifiable Credentials

Call them certificates, attestations, claims, or credentials. The time has come for the next evolution of borrowed trust.

Signed Content

All kinds of data can be altered, spoofed, or faked. Cryptographic signatures can prove the origins of documents, photos, video, and more.

Personal Data Stores

Privacy regulations and never ending data breaches are motivating bold new architectures to protect sensitive personal data.

Offline-first Design

Extreme conditions demand extreme engineering. In an emergency or at sea, availability with no grid power or internet can't be an afterthought.

Data Synchronization

Without internet connectivity, syncing between devices is a challenge. P2P replication brings high availability to your personal device cloud.

Local Search

Offline device local search in your mobile and desktop apps can dramatically improve user experience and unlock the value of your data.

Mesh Networks

Applications can be more convenient to use and more resilient in adverse conditions, with NFC, Bluetooth, WiFi Direct, and Multipeer Connectivity.

Hardware Security Modules

Strong cryptography is useless if you can't protect your keys. Leverage the Trusted Execution Environment, StrongBox, and Secure Enclave.


From wearables to supply chain logistics, low power microprocessors are everywhere. Smart Cards and ARM chips keep your footprint small.

Strong Authentication

With new standards like W3C WebAuthn and on-device biometrics like TouchID, options for eliminating passwords are improving every day.

Dynamic Access Control

Traditional methods of access control fall short. Improve your posture with advanced methods like ABAC and Object Capabilities.

Secure Logging

Protection is only part of the security lifecycle. Countermeasures like tamper-evident logs enable detection and response.

Here's how we can help

Clever Hacks

In the MIT tradition, a hack is a clever solution to an interesting problem. Less involved than prototypes, hacks can help you blast through barriers and grok feasibility, tradeoffs, and impact.

1 to 4 weeks
1 to 2 engineers
$5,000 +

Rapid Prototypes

Opportunity and risk go hand in hand with emerging technologies. Prototypes help you learn and adapt, before you have to bet the farm. We work with you to explore, build, evaluate, assimilate, and innovate.

1 to 6 months
2 to 5 engineers
$25,000 +

Open Standards

Open standards make interop possible and help us all extend our reach. We have plenty of experience reading RFCs and writing code to match. You can hire us to implement or co-sponsor a project. Let's collaborate!

1 to 5 engineers
Contact us

It's easy to work with us.
Start with a small hack and
let's get to know each other.

Meet The Team

We didn't get to be Stranger Labs overnight.

This team has history. From mountains to MIT. Across hemispheres and years. We've dreamed, hacked, learned, tinkered, tested, debugged, discovered, refactored, starved, hustled, feasted, focused, bloodied our knuckles, pulled all-nighters, shaved yaks, slayed dragons, powered through, stuck together. And we're just getting started.


The Chief Instigator


The Mad Scientist


The Rocket Surgeon

St. John

The Red Team


The Privacy Nut

Research Publications

Toward Distributed Key Management for Offline Authentication

Gregory Linklater • Christian Smith • Alan Herbert • Barry Irwin

The immaturity of current distributed key management solutions results in general disregard of security advisories in favour of convenience and accessibility. This research proposes the use of intermediate certificates as a distributed key management solution.


Offline-First Design for Fault Tolerant Applications

Gregory Linklater • Craig Marais • Alan Herbert • Barry Irwin

Faults are inevitable and frustrating, as we increasingly depend on network access and the chain of services that provides it, we suffer a greater loss in productivity when any of those services fail and service delivery is suspended. This research explores connectivity and infrastructure fault tolerance through offline-first application design.

JSON Schema for Attribute-based Access Control for Network Resource Security

Gregory Linklater • Christian Smith • James Connan • Alan Herbert • Barry Irwin

This research proposes JSON Schema as a modeling language that caters to the JSON object model paradigm on which to base an ABAC rule language. It continues to demonstrate its viability for the task by comparison against the features provided to XACML by XML Schema.

Ready to talk?

Send us a message

For general inquiries, please tell us a little about yourself and how we might be able to help. We'll only use your email to get back to you.